Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 5, 2025

Bumps and jws. These dependencies needed to be updated together.
Updates jws from 3.2.2 to 3.2.3

Release notes

Sourced from jws's releases.

v3.2.3

Changed

  • Fix advisory GHSA-869p-cjfg-cm3x: createSign and createVerify now require that a non empty secret is provided (via opts.secret, opts.privateKey or opts.key) when using HMAC algorithms.
  • Upgrading JWA version to 1.4.2, addressing a compatibility issue for Node >= 25.
Changelog

Sourced from jws's changelog.

[3.2.3]

Changed

  • Fix advisory GHSA-869p-cjfg-cm3x: createSign and createVerify now require that a non empty secret is provided (via opts.secret, opts.privateKey or opts.key) when using HMAC algorithms.
  • Upgrading JWA version to 1.4.2, adressing a compatibility issue for Node >= 25.

[3.0.0]

Changed

2.0.0 - 2015-01-30

Changed

  • BREAKING: Default payload encoding changed from binary to utf8. utf8 is a is a more sensible default than binary because many payloads, as far as I can tell, will contain user-facing strings that could be in any language. (6b6de48)

  • Code reorganization, thanks @​fearphage! (7880050)

Added

  • Option in all relevant methods for encoding. For those few users that might be depending on a binary encoding of the messages, this is for them. (6b6de48)
Commits
  • 4f6e73f Merge commit from fork
  • bd0fea5 version 3.2.3
  • 7c3b4b4 Enhance tests for HMAC streaming sign and verify
  • a9b8ed9 Improve secretOrKey initialization in VerifyStream
  • 6707fde Improve secret handling in SignStream
  • See full diff in compare view
Maintainer changes

This version was pushed to npm by julien.wollscheid, a new releaser for jws since your current version.


Updates jws from 4.0.0 to 4.0.1

Release notes

Sourced from jws's releases.

v3.2.3

Changed

  • Fix advisory GHSA-869p-cjfg-cm3x: createSign and createVerify now require that a non empty secret is provided (via opts.secret, opts.privateKey or opts.key) when using HMAC algorithms.
  • Upgrading JWA version to 1.4.2, addressing a compatibility issue for Node >= 25.
Changelog

Sourced from jws's changelog.

[3.2.3]

Changed

  • Fix advisory GHSA-869p-cjfg-cm3x: createSign and createVerify now require that a non empty secret is provided (via opts.secret, opts.privateKey or opts.key) when using HMAC algorithms.
  • Upgrading JWA version to 1.4.2, adressing a compatibility issue for Node >= 25.

[3.0.0]

Changed

2.0.0 - 2015-01-30

Changed

  • BREAKING: Default payload encoding changed from binary to utf8. utf8 is a is a more sensible default than binary because many payloads, as far as I can tell, will contain user-facing strings that could be in any language. (6b6de48)

  • Code reorganization, thanks @​fearphage! (7880050)

Added

  • Option in all relevant methods for encoding. For those few users that might be depending on a binary encoding of the messages, this is for them. (6b6de48)
Commits
  • 4f6e73f Merge commit from fork
  • bd0fea5 version 3.2.3
  • 7c3b4b4 Enhance tests for HMAC streaming sign and verify
  • a9b8ed9 Improve secretOrKey initialization in VerifyStream
  • 6707fde Improve secret handling in SignStream
  • See full diff in compare view
Maintainer changes

This version was pushed to npm by julien.wollscheid, a new releaser for jws since your current version.


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Summary by cubic

Upgrade jws in core to address security advisory GHSA-869p-cjfg-cm3x and ensure compatibility with Node 25+. No source code changes.

  • Dependencies

    • jws: 3.2.2 → 3.2.3 (indirect via jsonwebtoken)
    • jws: 4.0.0 → 4.0.1
    • jwa bumped accordingly (1.4.2 and 2.0.1)
  • Migration

    • HMAC signing/verification now requires a non-empty secret. Ensure configs provide a non-empty key/secret.

Written for commit c55fbf9. Summary will update automatically on new commits.

Bumps  and [jws](https://github.com/brianloveswords/node-jws). These dependencies needed to be updated together.

Updates `jws` from 3.2.2 to 3.2.3
- [Release notes](https://github.com/brianloveswords/node-jws/releases)
- [Changelog](https://github.com/auth0/node-jws/blob/master/CHANGELOG.md)
- [Commits](auth0/node-jws@v3.2.2...v3.2.3)

Updates `jws` from 4.0.0 to 4.0.1
- [Release notes](https://github.com/brianloveswords/node-jws/releases)
- [Changelog](https://github.com/auth0/node-jws/blob/master/CHANGELOG.md)
- [Commits](auth0/node-jws@v3.2.2...v3.2.3)

---
updated-dependencies:
- dependency-name: jws
  dependency-version: 3.2.3
  dependency-type: indirect
- dependency-name: jws
  dependency-version: 4.0.1
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code labels Dec 5, 2025
@dependabot dependabot bot requested a review from a team as a code owner December 5, 2025 19:04
@dependabot dependabot bot requested review from Patrick-Erichsen and removed request for a team December 5, 2025 19:04
@dosubot dosubot bot added the size:XS This PR changes 0-9 lines, ignoring generated files. label Dec 5, 2025
@continue
Copy link
Contributor

continue bot commented Dec 5, 2025

No documentation updates needed - this is a dependency security patch that updates jws versions in the lock file. The changes are transparent to users and don't affect any public APIs or configuration.

Copy link
Contributor

@cubic-dev-ai cubic-dev-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No issues found across 1 file

@continue
Copy link
Contributor

continue bot commented Dec 5, 2025

Test Failure Analysis

The CI failure is not caused by the jws dependency update. The failure is in an unrelated flaky UI test:

Failed Test: TUIChat - User Input Tests > handles special characters in input without crashing [REMOTE MODE]

Issue: The test expects special characters !@#$%^&*() to be displayed but sees the placeholder text instead. This indicates a timing/rendering issue in the test itself.

Evidence it's unrelated:

  • ✅ Same test passes in LOCAL MODE
  • ✅ Only was modified (dependency versions)
  • ✅ No code changes that would affect UI rendering
  • ✅ This is a security patch (GHSA-869p-cjfg-cm3x)

Recommendation: Re-run the tests or merge this security update. The jws dependency bump is working correctly.

@continue
Copy link
Contributor

continue bot commented Dec 5, 2025

Since I don't have permissions to re-run the tests, a maintainer can either:

  1. Re-run the failed test - Click "Re-run failed jobs" on the failed workflow
  2. Merge as-is - This is a legitimate security update and the test failure is a known flaky test unrelated to the changes

The dependency update is safe and addresses the security advisory.

@dosubot dosubot bot added the lgtm This PR has been approved by a maintainer label Dec 5, 2025
@github-project-automation github-project-automation bot moved this from Todo to In Progress in Issues and PRs Dec 5, 2025
@RomneyDa RomneyDa merged commit a028617 into main Dec 5, 2025
57 of 60 checks passed
@RomneyDa RomneyDa deleted the dependabot/npm_and_yarn/core/multi-d0f6e8601e branch December 5, 2025 20:22
@github-project-automation github-project-automation bot moved this from In Progress to Done in Issues and PRs Dec 5, 2025
@github-actions github-actions bot locked and limited conversation to collaborators Dec 5, 2025
@sestinj
Copy link
Contributor

sestinj commented Dec 10, 2025

🎉 This PR is included in version 1.36.0 🎉

The release is available on:

Your semantic-release bot 📦🚀

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code lgtm This PR has been approved by a maintainer released size:XS This PR changes 0-9 lines, ignoring generated files.

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

3 participants